Table of Contents

1. Advanced deduplication

Because more than 80% of data is duplicated across users,1 choose a solution that
compares data across all users in the enterprise (global deduplication) to minimize
storage and bandwidth requirements for backup. In addition, checking for duplicate
data on the endpoint (client-side deduplication) ensures duplicate data is never
transferred to the server, saving large amounts of bandwidth and resulting in faster
and smoother backups. Reap additional savings with a solution that understands the
on-disk formats of various applications and does not back up duplicate data within
files (application-aware deduplication).

More than 80% of data is duplicated across users.

2. WAN optimization

Approximately 200 million employees work remotely,2 which means looking for
a solution that guarantees successful and non-intrusive backups on a variety of
networks. WAN optimization ensures that backups are fast and effective, even over
weak networks, by optimizing packet size based on network noise and latency and
using parallel connections. Backups that are interrupted over weak networks resume
automatically without interrupting the user, saving user time and productivity.

3. Resource throttling

Ensure backups are successfully executed in the background without interrupting the
user by choosing a solution with resource throttling. If backup processes slow down
an employee’s computer, he will cancel the backup, leaving his data unsecure.

Adapt backup processes to available bandwidth with smart percentage-based
bandwidth caps that effectively back up data on WAN or LAN networks of varying
quality. CPU throttling should also be offered to ensure that backups do not interfere
with users’ high-priority applications by giving them precedence over backup
processes.

Smart percentage-based bandwidth caps effectively back up data on networks of varying quality.

4. Enterprise-grade security

With 70 million mobile devices lost or stolen each year,3 enterprise-grade security
is imperative to protect critical corporate data on employee devices. Prevent
unauthorized access by looking for solutions that encrypt data in transit, on the
server, and on the endpoint device. Look for solutions that offer remote wipe and
geo-location, allowing the location of a device to be pinpointed and corporate data to
be removed.

If considering cloud backup solutions, look for two-factor encryption mechanisms that
prevent even the solution-provider from accessing corporate data on the servers.
Make sure that cloud backup uses certified cloud infrastructure such as ISAE 3000
and SAS 70.

5. User self-service

Anytime, anywhere access and self-restore via client, web, and/or mobile reduce
IT support time and resources. For instance, if an employee loses his laptop on a
business trip, he can access his documents on another device such as a smartphone
or self-restore his data to a new machine and minimize lost productivity.

6. Centralized management

Choose a product with centralized management to deploy globally without user
involvement. A unified console enables easy policy management and reporting for
IT administrators. Even as a company scales, management continues through one
centralized interface, so adding and managing new users is easy.

7. BYOD enablement

More than 70% of all smartphone-owning professionals use their personal devices
to access corporate data,4 so choosing a solution that helps manage commingling
of corporate and personal data with BYOD backup policies is critical. Administrators
should be able to configure which folders are to be backed up, as well as the
frequency of backups, and define which mobile resources are to be used (e.g., data
connection if WiFi is unavailable) so users continue to retain privacy and productivity
without compromising protection of corporate data.

Features like remote wipe as mentioned in #4 are useful in the situation where an
employee leaves the company, so that IT administrators can remove corporate data
from the employee’s personal devices. Additional BYOD enablement features should
include file sync and sharing, mobile apps for various platforms, and web browser
access.

8. Settings backup

Make replacing a user’s hardware or migrating to a new OS much simpler by looking
for solutions that layer backup of a user’s data along with his personal settings. Being
able to restore a user’s personal settings and data regardless of device model and
operating system saves a lot of time for administrators. End users benefit because
they can continue working in a familiar work environment without spending time
reconfiguring personal settings.

Conclusion

Choosing an endpoint backup solution that includes the eight features
above will ensure full data protection, maximize user productivity, and
reduce time and maintenance for IT administrators. Be confident that
your endpoint backup solution is the right choice.